Premium Essay

Trainee Pre-Packet 2013

In: Other Topics

Submitted By sunny528896
Words 7845
Pages 32
Block 1

1

Introduction to the Professional Ethics Training Responsible Conduct of Research (PET-RCR)
The University of Oklahoma

Block 1

2

Professional Ethics Training – Responsible Conduct of Research
Thank you for signing up for the Professional Ethics Training – Responsible Conduct of Research (PET-RCR) seminar. Certification: All training participants are expected to attend and actively participate on both days of training. A certificate of completion will be issued to trainees who complete the two-day training. Purpose: Responsible Conduct of Research (RCR) training is part of an effort by the University of Oklahoma to provide graduate students with superior educational opportunities for professional growth. This training has been developed to increase your awareness of ethical issues, to convey common problems in ethical decision-making, and to provide strategies for managing ethical dilemmas that may occur while conducting research. At the end of this training, you will have acquired tools that will help you in conducting research and managing ethical dilemmas. Contents of this Packet: This training packet contains materials that will introduce you to ethical decision-making in research and will be used throughout the training. Please bring your completed packet with all of the enclosed materials to each training session. This packet contains a number of items including: 1) Training Agenda & Packet Instructions 2) Ethical Guidelines for the Conduct of Research 3) Cases & Questions Packet If you have any questions concerning the training, the materials in this packet, or scheduling, please e-mail at prof.ethics.training@ou.edu.

Block 1

3

Training Agenda

Day 1
Registration 8:30 - 9:00 I. Complexity in Ethical Decision-Making § 9:00 – 10:30 II. Personal Biases § 10:30 – 12:00 Lunch 12:00 – 1:00 III. Problems in Decision-Making §…...

Similar Documents

Premium Essay

Packet Switching

... Алматы 2012 СОДЕРЖАНИЕ 1 Annotation 3 2 PACKET SWITCHING 3 3 КОММУТАЦИЯ ПАКЕТОВ 6 ТЕРМИНОЛОГИЧЕСКИЙ СЛОВАРЬ 10 СПИСОК ЛИТЕРАТУРЫ 11 Annotation This text describes packet switching, its modes and history. The main topic of this text is how packet switching works. Packet switching is a digital networking communications method that groups all transmitted data – regardless of content, type, or structure – into suitably sized blocks, called packets. The concept of switching small blocks of data was first explored by Paul Baran in the early 1960s. Independently, Donald Davies at the National Physical Laboratory (NPL) in the UK had developed the same ideas a few years. Two major packet switching modes exist; (1) connectionless packet switching, also known as datagram switching, and (2) connection-oriented packet switching, also known as virtual circuit switching. In the first case each packet includes complete addressing or routing information. 1 PACKET SWITCHING Packet switching is a digital networking communications method that groups all transmitted data – regardless of content, type, or structure – into suitably sized blocks, called packets. First proposed for military uses in the early 1960s and implemented......

Words: 3704 - Pages: 15

Premium Essay

Packet

...Chapter 2 Packet 4 Review notes: Internal rhyme: __________________________________________________ ____________________________________________________________________ Ex: _________________________________________________________________ Alliteration: ___________________________________________________ ____________________________________________________________________ Ex: _________________________________________________________________ Onomatopoeia:___________________________________________________ ____________________________________________________________________ Ex: _________________________________________________________________ Read the biography of Edgar Allan Poe on pages 253-4 and list 4 facts about his life. a. b. c. d. “The Raven” p. 274-277 1. What is the setting of the poem (time and place)? 2. What is the rhyme scheme in the first stanza? Does Poe maintain this rhyme scheme? 3. List all the questions that the narrator asks the raven. 4. What does the narrator say he is trying to do in lines 9-10? 5. In the third stanza, list all the words that are examples of alliteration. What effect does this alliteration have on the poem? 6. How does the significance of the word “nevermore” change throughout the poem? 7. What is the mood throughout the poem? What images help establish this mood? 8. In line 101, what do you think the narrator means when he begs the bird to “Take thy beak from out...

Words: 294 - Pages: 2

Free Essay

Trainee Experience

...My experience as a trainee I started my in – service training on the 1st of February 2013 at a Guest House in Beacon Bay- East London. I felt excited that I had found an organisation that would help me gain experience in the field of tourism and at the same time prepare me for the working environment, I also felt very nervous as I was not clear of what my duties entailed, what was expected of me as a trainee and I was also not sure about the company rules and regulations. On the first day of work, I was told that I will be working in the office as a manager’s personal assistant and I was showed how everything works. I had to learn everything very quickly as the lady that was training me was available for that day only; my mistake was not having a note book to write down notes as she was showing me around, nothing seemed complicated at that moment and I thought I could easily do the job until I made my first mistake, I typed a quotation and faxed it to a client without stamping and/or signing it and my manager noticed, she is a perfectionist she pays attention to every detail and she was upset about it. The industry is people oriented and to attract people to the guest house we should always do the job to the best of our abilities and ensure that they have a worthwhile stay with us so that they also feel that they are cared for, they are respected and their needs are catered for, and so I understood her emotions. My responsibilities include • Typing of......

Words: 458 - Pages: 2

Free Essay

Packet Sniffing

... A SEMINAR REPORT ON | PACKET SNIFFER | SUBMITTED BY SUBMITTED ONKUNAL GOPAL THAKUR MAY 14,2010VISHAL SHIRGUPPIJUSTIN FRANCISSHAZIA ALIUNDER THE GUIDANCE OF MR. SUNIL SURVEFR. CONCEICAO RODRIGUES COLLEGE OF ENGINEERINGBANDRA(W)MUMBAI – 400 050 | CERTIFICATE This is to certify that, Mr. KUNAL GOPAL THAKUR , Mr. VISHAL SHIRGUPPI ,Mr. JUSTIN FRANCIS and Ms. SHAZIA ALI have completed their project on PACKET SNIFFER satisfactorily in partial fulfillment under the department of Computer Engineering during academic year 2009-2010. ____________________________ Teacher In-Charge ACKNOWLEDGEMENT We would like to express our sincere thanks and gratitude to our guide Mr. Sunil Surve for his valuable guidance and suggestions. We are highly indebted to him for providing us an excellent opportunity to learn and present our studies in the form of this seminar report. We take this opportunity to thank the members of the teaching and non-teaching staff of Fr.CRCE for the timely help extended by them. Lastly thanking our parents, for their morale support and encouragement. Kunal Gopal Thakur Vishal Shirguppi Justin Francis Shazia Ali ABSTRACT: Packet sniffing is a technique of monitoring every packet that crosses the network. A packet sniffer is a piece of software or......

Words: 3356 - Pages: 14

Free Essay

Hiring Packet

...8610 Hansen Ave. Shakopee, MN 55379 BIFFS, INC. Instructions for New Hire Packet – Applicant Directions 1. Page 2 – Checklist - Fill in or verify your name and social security number. Supervisor to fill in the date of hire & Company assigned (EID) employee identification number. 2. Pages 3 – 7 – DOT Application - must all be completed including 10 years (if CDL holder); 3 years (if non-CDL holder) of previous work history, addresses, & phone numbers. ** If there is any time frame for unemployment or selfemployment please list. DOT is looking for a complete trail of information provided by the driver representing where they have been from date to date. Please complete this form and provide a signature/ date at bottom of page 7. Read “Driver Rights” provided by your company. 3. Page 8 - Previous Employer form – Only sign the top box on the first page where it states Applicant signature and date. Company / Supervisors will send out to the previous employers listed on driver’s application. 4. Page 9 – DISCLOSURE - sign and date bottom *Company is required to order and obtain a current MVR for driver prior to hiring or being moved into a driving position. Driver written authorization is required. 5. Page 10 top Record of Violations form – Fill in any moving traffic violations you have had within the past 12 months; provide a signature & date. If no violations check box. Page 10 bottom – Annual Review (SKIP) to be completed by supervisor with a current MVR. MVR=Motor...

Words: 8061 - Pages: 33

Free Essay

Spanish Packet

...student textbook, and the pass codes for its Supersite and the WebSAM. Set up/create your Imagina Supersite account. After purchasing your Supersite access code, you’ll receive confirmation that it is redeemable. Next, create a Supersite account so that you can use the Supersite. Go to HYPERLINK "http://imagina2e.vhlcentral.com/" http://imagina2e.vhlcentral.com/. Then, click on the “Create an account” under the “New to VHL Central?” Enter your access code to get started and follow the directions you are given. You’ll need to provide information to create your account and click on “Create an account”. Then, you’ll see the main view of your Supersite. Enroll in my course, Span. IV AP from July 1, 2012 to June 12, 2013. (These dates allow you to start submitting Supersite work during the early part of the summer.) You will click on the “Enroll” link at the top of the Students tool sidebar. On the “Select School Location and Type” choose “United States”, “California” and “High Schools”. Click Save & Continue. On the “Select Your School” page, select “Note Dame High School” from the list and Save & Click. You should see my name, dates of instruction and Section 1. Then click Save. You’ll see a confirmation of enrolling successfully in the class. Now you can do and submit work for activities on the Supersite and WebSAM. Before Aug. 5th Open up the Supersite – providing your necessary Log in information, and take......

Words: 1736 - Pages: 7

Premium Essay

Management Trainee

...University of Lethbridge – Faculty of Management MANAGEMENT 3100 Intermediate Financial Accounting I Course Outline – Fall 2014 Instructor: Carla Carnaghan, Ph.D., CISA, CMA Office & Hours: Calgary Campus office, 5:00 – 6:00pm Thursdays. Please email for appointment, and for alternative times. Office hours may be done in person, with Webex, or by phone, and for smaller issues with email. E-mail: Carla.Carnaghan@uleth.ca (emails received in the evening, particularly after 10 PM, may not be responded to until the next day) Telephone: 1- 403-329-2351 (Lethbridge office – Please use e-mail where possible) Class Times: Y Section: Th 1800-2050 (S6013A) Course Web Page: on Moodle Course Pre-requisites* Prerequisites: MGT 2400; ECON 1010 and 1012 and STAT 1770 or admission to the CA Bridging Program/Professional Diploma in Accounting; a minimum C- grade is required in all prerequisite courses; MGT 3040 (co-requisite) * It is the responsibility of students to check the prerequisites for courses before registration. If students are registered in a course for which they do not have the prerequisites, and they have not received prior permission from the appropriate program chair, they can be de-registered. If this occurs after the drop/add date, tuition will not be refunded. Course Objectives Building from MGT 2100, this course examines the accounting concepts, principles, judgments, and techniques......

Words: 6524 - Pages: 27

Premium Essay

Packet Tracer

...Packet T P Tracer - Connec a Router to a LAN ct Topology T Addressing Table A g Device Interface G0 0/0 R1 R G0 0/1 S0 0/0/0 (DCE) G0 0/0 R2 R G0 0/1 S0 0/0/0 PC1 P PC2 P PC3 P PC4 P NIC NIC NIC NIC IP Addr ress 192.168.10 0.1 192.168.11 1.1 209.165.20 00.225 10.1.1.1 10.1.2.1 209.165.20 00.226 192.168.10 0.10 192.168.11 1.10 10.1.1.10 10.1.2.10 Subnet Mask S 255 5.255.255.0 255 5.255.255.0 255 5.255.255.252 255 5.255.255.0 255 5.255.255.0 255 5.255.255.252 255 5.255.255.0 255 5.255.255.0 255 5.255.255.0 255 5.255.255.0 Default G Gateway N/A N/A N/A N/A N/A N/A 192.168.10.1 192.168.11.1 10.1.1.1 10.1.2.1 Objectives O Part 1: Di isplay Route Information er Part 2: Co onfigure Rou uter Interface es Part 3: Ve erify the Con nfiguration © 2013 Cisco and its affiliates. All rights reserve This docume is Cisco Public. d/or ed. ent Page 1 of 5 Packet Tracer - Connect a Router to a LAN Background In this activity, you will use various show commands to display the current state of the router. You will then use the Addressing Table to configure router Ethernet interfaces. Finally, you will use commands to verify and test your configurations. Note: The routers in this activity are partially configured. Some of the configurations are not covered in this course, but are provided to assist you in using verification commands. Part 1: Display Router Information Step 1: Display interface information on R1. Note: Click a device and then click the CLI tab to access......

Words: 1346 - Pages: 6

Free Essay

Packet Switching

...Packet Switching The concept of packet switching was first developed in the early 1960s, by researchers at the Massachusetts Institute of Technology. Packet switching is the dividing of messages into packets before they are sent, transmitting each packet individually, and then reassembling them into the original message once all of them have arrived at the intended destination. Packets are the fundamental unit of information transport in all modern computer networks, and increasingly in other communications networks as well. Each packet, which can be of fixed or variable size depending on the protocol, consists of a header, body, and a trailer. The body contains a segment of the message being transmitted. The header contains a set of instructions regarding the packet's data, the number of packets into which the message has been divided, the identification number of the particular packet, the protocol, packet length and synchronization. Packets are typically routed from source to destination using network switches and routers. Each packet contains address information that identifies the sending computer and intended recipient. Using these addresses, network switches and routers determine how best to transfer the packet to its destination Pros and Cons of Packet Switching Packet switching is the alternative to circuit switching protocols used historically for telephone (voice) networks and sometimes with ISDN connections. Compared to circuit switching, packet......

Words: 307 - Pages: 2

Premium Essay

Packet Tracer

...------------------------------------------------- Name: Amanpreet Singh Date: 05/31/2015 Week# 4 ------------------------------------------------- Activity# 6.6.1.2 – Skills Integration Challenge ------------------------------------------------- Activity Report 1. Write a short paragraph (minimum five college-level sentences) below that summarizes what was accomplished in this lab, what you learned by performing it, what challenges you faced. ------------------------------------------------- This week’s packet tracer was arguably difficult but at the same time, they were very informative and educational. I had to refer to the book several times to learn the commands for configuration. In the end, it was a long packet tracer but it surely helped and I am glad I learned from it. ------------------------------------------------- Packet Tracer – Skills Integration Challenge Addressing Table Device | Interface | IP Address | Subnet Mask | Default Gateway | VLAN | R1 | S0/0/0 | 172.31.1.2 | 255.255.255.0 | N/A | N/A | | G0/0.10 | 172.31.10.1 | 255.255.255.0 | N/A | 10 | | G0/0.20 | 172.31.20.1 | 255.255.255.0 | N/A | 20 | | G0/0.30 | 172.31.30.1 | 255.255.255.0 | N/A | 30 | | G0/0.88 | 172.31.88.1 | 255.255.255.0 | N/A | 88 | | G0/0.99 | 172.31.99.1 | 255.255.255.0 | N/A | 99 | S1 | VLAN 88 | 172.31.88.33 | 255.255.255.0 | 172.31.88.1 | 88 | PC-A | NIC | 172.31.10.21 | 255.255.255.0 | 172.31.10.1 | 10 | PC-B | NIC |......

Words: 493 - Pages: 2

Premium Essay

Acme Packet

...accounting conventions. These figures are bound to follow the concepts of Prudence and Accruals. Which says that expense should be recorded when it can be foresee. Whereas cash flows statement only consists of all the cash movements within the business. Cash flow tends to deduct or add any movements which cannot be justifiable in monetary term or within which the cash is not involved. ii. Provide a likely and economically sound reason why this company has both an extremely high Gross Margin and a negative Operating Margin. Acme Packet is in session delivery network solutions and is vulnerable to both technological advancement and marketing its product. The fact that Gross Margin is high because the cost of providing this service is low but generates high profit margin. But however due to vulnerability to technological advancements they must incur tons of money into their research and development program in order to upgrade its solutions. Acme Packet must also have to incur heavy marketing cost in order to showcase their solutions due to fierce competition among the players in IT industry. Gross Margin is (Total Revenue minus Total Cost of Goods Sold) divided by Total Revenue. Operating Margin is (Total Revenue minus Total Operating Expenses) divided by Total Revenue. Mechanics: iii. Why do we add back a decrease to Accounts Receivable? A decrease in Accounts Receivable indicates that one of our customer had paid his owed account. When a customer pay his /......

Words: 420 - Pages: 2

Premium Essay

Trainee Program

...2015-2016 REQUEST FOR APPLICATIONS Susan G. Komen 5005 LBJ Freeway, Suite 250 Dallas, Texas 75244 Research Programs Help Desk: 1-866-921-9678 Questions: www.komen.org/researchhelpdesk Website: www.komen.org TABLE OF CONTENTS KEY DATES 3 KOMEN RESEARCH PROGRAM 3 GRADUATE TRAINING IN DISPATIRIES RESEARCH GRANTS 3 ELIGIBILITY REQUIREMENTS 4 FUNDING INFORMATION AND GRANT TERM 4 APPLICATION REQUIREMENTS 5 OPTIONAL COMPONENTS 7 PRE-APPLICATION REVIEW PROCESS 8 PRE-APPLICATION SUBMISSION INSTRUCTIONS 9 Administrative Requirements 9 Pre-Application Submission Deadline 9 Getting Started in proposalCENTRAL 9 Title Page 10 Download Templates & Instructions 10 Applicant/Principal Investigator (PI) 10 Institution & Contacts 10 Key Personnel 10 Non-Key Personnel 11 Narrative and Supporting Documents 11 Validate 15 Submit 15 FULL APPLICATION SUBMISSION Graduate Training in Disparities Research Grants, 2015-2016 Request for Applications 15 Page 2 of 15 KEY DATES Application System Opens: Pre-Application Due: Pre-Application Decision: Full Application Due: Award Notification: May 6, 2015 June 17, 2015, by 1 p.m., Eastern Standard Time September 16, 2015 November 9, 2015, by 1 p.m., Eastern Standard Time On or around April 15, 2016 KOMEN RESEARCH PROGRAM At Susan G. Komen®, we are committed to ending breast cancer forever by empowering people, energizing science to find the cures and ensuring quality care for all people, everywhere. Our......

Words: 7738 - Pages: 31

Free Essay

2013

...CASE EXAMINATION EmRen Publishing Incorporated MAY 2013 © 2014 The Society of Management Accountants of Canada. All rights reserved. ®/™ Registered Trade-Marks/Trade-Marks are owned by The Society of Management Accountants of Canada. No part of this document may be reproduced in any form without the permission of the copyright holder. May 2013 Case Examination TABLE OF CONTENTS May 2013 Case Examination Page Case Question: Backgrounder ................................................................................... 1 Additional Information ..................................................................... 15 General Comments on Performance ....................................................... 30 Steps for Approaching Business and Corporate Strategy ........................ 41 Marker Assessment Guide ....................................................................... 48 Solution Notes for Markers....................................................................... 58 Sample Response – Successful Attempt #1 ............................................ 79 Sample Response – Successful Attempt #2 .......................................... 111 Sample Response – Unsuccessful Attempt ........................................... 152 May 2013 Case Examination May 2013 Case Examination Backgrounder The background information relating to the Case Examination (Backgrounder) is provided to candidates in advance of the examination date. The...

Words: 26997 - Pages: 108

Free Essay

Packet Filtering

...Packet Filtering Index Should arriving packet be allowed in? Should a departing packet be let out? Filter packet-by-packet, making decisions to forward/drop a packet based on: Functions of Packet Filter Control: Allow only those packets that you are interested in to pass through. Security: Reject packets from malicious outsiders Watchfulness: Log packets to/from outside world In a software firewall, packet filtering is done by a program called a packet filter. The packet filter examines the header of each packet based on a specific set of rules, and on that basis, decides to prevent it from passing (called DROP) or allow it to pass (called ACCEPT). There are three ways in which a packet filter can be configured, once the set of filtering rules has been defined. In the first method, the filter accepts only those packets that it is certain are safe, dropping all others. This is the most secure mode, but it can cause inconvenience if legitimate packets are inadvertently dropped. In the second method, the filter drops only the packets that it is certain are unsafe, accepting all others. This mode is the least secure, but is causes less inconvenience, particularly in casual Web browsing. In the third method, if the filter encounters a packet for which its rules do not provide instructions, that packet can be quarantined, or the user can be specifically queried concerning what should be done with it. This can be inconvenient if it causes numerous dialog boxes to......

Words: 256 - Pages: 2

Premium Essay

Training and Pre-Planning

...Training and Pre-Planning Is Key Jason Rogers COMM/215 28 May 2012 Cecelia Weber Training and Pre-Planning Is Key Introduction In my case study, Carl Robbins, a campus recruiter for ABC, Inc., has been made aware of multiple issues a couple weeks before the new hire orientation that he scheduled. Given that the ABC campus recruiter, Carl Robbins, had six months of experience and was developing difficulties with the pre-planning for his new hire orientation, I conclude that the company ABC needs to provide better training to personnel, improve conference room reservation procedures, and provide a checklist to recruiters for new hire packets. Background In early April, Carl Robins successfully recruited 15 new hires to work for Monica Carrols. He has only been working for ABC, Inc. for six months, and this was his first recruitment mission. He scheduled a new hire orientation that would take place on June 15 because he wanted the new hires to start working by July. On May 15, Monica contacted him in reference to the training schedule, orientation manuals, and other issues that involved the recruits he hired in April. Carl reassured Monica that everything would be done on time in accordance with the planned schedule. After Memorial Day, Carl decided to look over the new trainee files to make sure all the paperwork was completed before orientation. He then realized that a couple of the recruits did not have their applications completed and their transcripts were not......

Words: 1606 - Pages: 7